[Buildroot] [PATCH-2019.02] package/glibc: bump version for additional post-2.28 security fixes
Peter Korsgaard
peter at korsgaard.com
Fri Mar 29 13:45:01 UTC 2019
>>>>> "Peter" == Peter Korsgaard <peter at korsgaard.com> writes:
> Fixes the following security vulnerabilities:
> CVE-2019-6488: On x32, the size_t parameter may be passed in the lower
> 32 bits of a 64-bit register with with non-zero upper 32 bit. When it
> happened, accessing the 32-bit size_t value as the full 64-bit register
> in the assembly string/memory functions would cause a buffer overflow.
> Reported by H.J. Lu.
> CVE-2019-7309: x86-64 memcmp used signed Jcc instructions to check
> size. For x86-64, memcmp on an object size larger than SSIZE_MAX
> has undefined behavior. On x32, the size_t argument may be passed
> in the lower 32 bits of the 64-bit RDX register with non-zero upper
> 32 bits. When it happened with the sign bit of RDX register set,
> memcmp gave the wrong result since it treated the size argument as
> zero. Reported by H.J. Lu.
> CVE-2016-10739: The getaddrinfo function could successfully parse IPv4
> addresses with arbitrary trailing characters, potentially leading to data
> or command injection issues in applications.
> CVE-2019-9169: Attempted case-insensitive regular-expression match
> via proceed_next_node in posix/regexec.c leads to heap-based buffer
> over-read. Reported by Hongxu Chen.
> Signed-off-by: Peter Korsgaard <peter at korsgaard.com>
Committed to 2019.02.x, thanks.
--
Bye, Peter Korsgaard
More information about the buildroot
mailing list